|
|
Books > Computing & IT > Applications of computing > General
This book serves as a guide to help the reader develop an awareness
of security vulnerabilities and attacks, and encourages them to be
circumspect when using the various computer resources and tools
available today. For experienced users, Computer Science Security
presents a wide range of tools to secure legacy software and
hardware. Computing has infiltrated all fields nowadays. No one can
escape this wave and be immune to security attacks, which continue
to evolve, gradually reducing the level of expertise needed by
hackers. It is high time for each and every user to acquire basic
knowledge of computer security, which would enable them to mitigate
the threats they may face both personally and professionally. It is
this combined expertise of individuals and organizations that will
guarantee a minimum level of security for families, schools, the
workplace and society in general.
The Definitive Guide to Arm (R) Cortex (R)-M23 and Cortex-M33
Processors focuses on the Armv8-M architecture and the features
that are available in the Cortex-M23 and Cortex- M33 processors.
This book covers a range of topics, including the instruction set,
the programmer's model, interrupt handling, OS support, and debug
features. It demonstrates how to create software for the Cortex-M23
and Cortex-M33 processors by way of a range of examples, which will
enable embedded software developers to understand the Armv8-M
architecture. This book also covers the TrustZone (R) technology in
detail, including how it benefits security in IoT applications, its
operations, how the technology affects the processor's hardware
(e.g., memory architecture, interrupt handling, etc.), and various
other considerations in creating secure software.
In order to study living organisms, scientists not only study them
at an overall macroscopic scale but also on a more detailed
microscopic scale. This observation, pushed to its limits, consists
of investigating the very center of each cell, where we find the
molecules that determine the way it functions: DNA
(deoxyribonucleic acid) and RNA (ribonucleic acid). In an organism,
DNA carries the genetic information, which is called the genome. It
is represented as four-letter sequences using the letters A, C, G
and T; based on these sequences, computer methods described in this
book can answer fundamental questions in bioinformatics. This book
explores how to quickly find sequences of a few hundred nucleotides
within a genome that may be made up of several billion, how to
compare those sequences and how to reconstruct the complete
sequence of a genome. It also discusses the problems of identifying
bacteria in a given environment and predicting the structure of RNA
based on its sequence.
Set your students on track to achieve the best grade possible with
My Revision Notes: AQA A-level Computer Science. Our clear and
concise approach to revision will help students learn, practise and
apply their skills and understanding. Coverage of key content is
combined with practical study tips and effective revision
strategies to create a guide that can be relied on to build both
knowledge and confidence. With My Revision Notes: AQA A-level
Computer Science, students can: > Consolidate knowledge with
clear, focused and relevant content coverage, based on what
examiners are looking for > Develop understanding with
self-testing - our regular 'Now test yourself,' tasks and answers
will help commit knowledge to memory > Improve technique through
exam-style practice questions, expert tips and examples of typical
mistakes to avoid > Identify key connections between topics and
subjects with our 'Learning links' focus > Plan and manage a
successful revision programme with our topic-by-topic planner, new
exam breakdown feature, user-friendly definitions throughout and
questions and answers online
Interest in big data has swelled within the scholarly community as
has increased attention to the internet of things (IoT). Algorithms
are constructed in order to parse and analyze all this data to
facilitate the exchange of information. However, big data has
suffered from problems in connectivity, scalability, and privacy
since its birth. The application of deep learning algorithms has
helped process those challenges and remains a major issue in
today's digital world. Advanced Deep Learning Applications in Big
Data Analytics is a pivotal reference source that aims to develop
new architecture and applications of deep learning algorithms in
big data and the IoT. Highlighting a wide range of topics such as
artificial intelligence, cloud computing, and neural networks, this
book is ideally designed for engineers, data analysts, data
scientists, IT specialists, programmers, marketers, entrepreneurs,
researchers, academicians, and students.
Digital controllers are part of nearly all modern personal,
industrial, and transportation systems. Every senior or graduate
student of electrical, chemical, or mechanical engineering should
therefore be familiar with the basic theory of digital controllers.
This new text covers the fundamental principles and applications of
digital control engineering, with emphasis on engineering design.
Fadali and Visioli cover analysis and design of digitally
controlled systems and describe applications of digital control in
a wide range of fields. With worked examples and Matlab
applications in every chapter and many end-of-chapter assignments,
this text provides both theory and practice for those coming to
digital control engineering for the first time, whether as a
student or practicing engineer.
This book is a guide to the combination of the Internet of Things
(IoT) and the Semantic Web, covering a variety of tools,
technologies and applications that serve the myriad needs of the
researchers in this field. It provides a multi dimensional view of
the concepts, tools, techniques and issues that are involved in the
development of semantics for the Web of Things. The various aspects
studied in this book include Multi-Model Multi-Platform (SHM3P)
databases for the IoT, clustering techniques for discovery services
for the semantic IoT, dynamic security testing methods for the
Semantic Web of Things, Semantic Web-enabled IoT integration for a
smart city, IoT security issues, the role of the Semantic Web of
Things in Industry 4.0, the integration of the Semantic Web and the
IoT for e-health, smart healthcare systems to monitor patients,
Semantic Web-based ontologies for the water domain, science fiction
and searching for a job.
 |
Principles of Security and Trust
- 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings
(Hardcover)
Lujo Bauer, Ralf Kusters
|
R1,547
Discovery Miles 15 470
|
Ships in 18 - 22 working days
|
|
|
As the progression of the internet continues, society is finding
easier, quicker ways of simplifying their needs with the use of
technology. With the growth of lightweight devices, such as smart
phones and wearable devices, highly configured hardware is in
heightened demand in order to process the large amounts of raw data
that are acquired. Connecting these devices to fog computing can
reduce bandwidth and latency for data transmission when associated
with centralized cloud solutions and uses machine learning
algorithms to handle large amounts of raw data. The risks that
accompany this advancing technology, however, have yet to be
explored. Architecture and Security Issues in Fog Computing
Applications is a pivotal reference source that provides vital
research on the architectural complications of fog processing and
focuses on security and privacy issues in intelligent fog
applications. While highlighting topics such as machine learning,
cyber-physical systems, and security applications, this publication
explores the architecture of intelligent fog applications enabled
with machine learning. This book is ideally designed for IT
specialists, software developers, security analysts, software
engineers, academicians, students, and researchers seeking current
research on network security and wireless systems.
With new technologies, such as computer vision, internet of things,
mobile computing, e-governance and e-commerce, and wide
applications of social media, organizations generate a huge volume
of data and at a much faster rate than several years ago. Big data
in large-/small-scale systems, characterized by high volume,
diversity, and velocity, increasingly drives decision making and is
changing the landscape of business intelligence. From governments
to private organizations, from communities to individuals, all
areas are being affected by this shift. There is a high demand for
big data analytics that offer insights for computing efficiency,
knowledge discovery, problem solving, and event prediction. To
handle this demand and this increase in big data, there needs to be
research on innovative and optimized machine learning algorithms in
both large- and small-scale systems. Applications of Big Data in
Large- and Small-Scale Systems includes state-of-the-art research
findings on the latest development, up-to-date issues, and
challenges in the field of big data and presents the latest
innovative and intelligent applications related to big data. This
book encompasses big data in various multidisciplinary fields from
the medical field to agriculture, business research, and smart
cities. While highlighting topics including machine learning, cloud
computing, data visualization, and more, this book is a valuable
reference tool for computer scientists, data scientists and
analysts, engineers, practitioners, stakeholders, researchers,
academicians, and students interested in the versatile and
innovative use of big data in both large-scale and small-scale
systems.
The Internet of Medical Things (IoMT) allows clinicians to monitor
patients remotely via a network of wearable or implantable devices.
The devices are embedded with software or sensors to enable them to
send and receive data via the internet so that healthcare
professionals can monitor health data such as vital statistics,
metabolic rates or drug delivery regimens, and can provide advice
or treatment plans based on this real-world, real-time data. This
edited book discusses key IoT technologies that facilitate and
enhance this process, such as computer algorithms, network
architecture, wireless communications, and network security.
Providing a systemic review of trends, challenges and future
directions of IoMT technologies, the book examines applications
such as breast cancer monitoring systems, patient-centric systems
for handling, tracking and monitoring virus variants, and
video-based solutions for monitoring babies. The book discusses
machine learning techniques for the management of clinical data and
includes security issues such as the use of blockchain technology.
Written by a range of international researchers, this book is a
great resource for computer engineering researchers and
practitioners in the fields of data mining, machine learning,
artificial intelligence and the IoT in the healthcare sector.
Social media has emerged as a powerful tool that reaches a wide
audience with minimum time and effort. It has a diverse role in
society and human life and can boost the visibility of information
that allows citizens the ability to play a vital role in creating
and fostering social change. This practice can have both positive
and negative consequences on society. Examining the Roles of IT and
Social Media in Democratic Development and Social Change is a
collection of innovative research on the methods and applications
of social media within community development and democracy. While
highlighting topics including information capitalism, ethical
issues, and e-governance, this book is ideally designed for social
workers, politicians, public administrators, sociologists,
journalists, policymakers, government administrators, academicians,
researchers, and students seeking current research on social
advancement and change through social media and technology.
|
|